public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* [Bug releng/6491] New: need runtime-analysis tool to extend blacklist
@ 2008-05-07 23:48 fche at redhat dot com
  2008-05-08 12:48 ` [Bug releng/6491] " mhiramat at redhat dot com
  2010-04-19 17:16 ` fche at redhat dot com
  0 siblings, 2 replies; 3+ messages in thread
From: fche at redhat dot com @ 2008-05-07 23:48 UTC (permalink / raw)
  To: systemtap

As seen in bug #6487, new kernel-side code called indirectly from probe handlers
via the runtime can cause deadlocks and whatnot.  It may be nice to have a script
that searches the external-reference/undefined-symbol chain starting from the
systemtap probe module, and a kernel build tree (individual compilation unit .o
files).  If only it could follow the undefined reference chain on a per-function
basis, the transitive closure could give us a pretty good blacklist suggestions.

(given an unresolved external function, find object file that defines it,
"objdump -dr" it to find the functions that it calls, then recurse).

(roland: your ideas regarding encoding the static call graph into dwarf would
be handy if ever implemented)

-- 
           Summary: need runtime-analysis tool to extend blacklist
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: releng
        AssignedTo: systemtap at sources dot redhat dot com
        ReportedBy: fche at redhat dot com


http://sourceware.org/bugzilla/show_bug.cgi?id=6491

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [Bug releng/6491] need runtime-analysis tool to extend blacklist
  2008-05-07 23:48 [Bug releng/6491] New: need runtime-analysis tool to extend blacklist fche at redhat dot com
@ 2008-05-08 12:48 ` mhiramat at redhat dot com
  2010-04-19 17:16 ` fche at redhat dot com
  1 sibling, 0 replies; 3+ messages in thread
From: mhiramat at redhat dot com @ 2008-05-08 12:48 UTC (permalink / raw)
  To: systemtap


------- Additional Comments From mhiramat at redhat dot com  2008-05-07 21:27 -------
(In reply to comment #0)
> As seen in bug #6487, new kernel-side code called indirectly from probe handlers
> via the runtime can cause deadlocks and whatnot.  It may be nice to have a script
> that searches the external-reference/undefined-symbol chain starting from the
> systemtap probe module, and a kernel build tree (individual compilation unit .o
> files).  If only it could follow the undefined reference chain on a per-function
> basis, the transitive closure could give us a pretty good blacklist suggestions.

Some functions called from probe 'module' may be safe. I think only functions
called from probe 'handlers' will cause problems.

> (given an unresolved external function, find object file that defines it,
> "objdump -dr" it to find the functions that it calls, then recurse).

cscope will help you trace call graph.

Thanks,

-- 


http://sourceware.org/bugzilla/show_bug.cgi?id=6491

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [Bug releng/6491] need runtime-analysis tool to extend blacklist
  2008-05-07 23:48 [Bug releng/6491] New: need runtime-analysis tool to extend blacklist fche at redhat dot com
  2008-05-08 12:48 ` [Bug releng/6491] " mhiramat at redhat dot com
@ 2010-04-19 17:16 ` fche at redhat dot com
  1 sibling, 0 replies; 3+ messages in thread
From: fche at redhat dot com @ 2010-04-19 17:16 UTC (permalink / raw)
  To: systemtap


------- Additional Comments From fche at redhat dot com  2010-04-17 15:30 -------
This approach may not yield useful blacklist additions.  Most of the
recent additions were not due to unexpected reentrancy, but some other
mysterious misbehavior.

-- 
           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |WONTFIX


http://sourceware.org/bugzilla/show_bug.cgi?id=6491

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2010-04-17 15:30 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2008-05-07 23:48 [Bug releng/6491] New: need runtime-analysis tool to extend blacklist fche at redhat dot com
2008-05-08 12:48 ` [Bug releng/6491] " mhiramat at redhat dot com
2010-04-19 17:16 ` fche at redhat dot com

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).